File encryption and decryption method and device and electronic equipment
A file encryption and encryption algorithm technology, applied in the computer field, can solve data privacy protection and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0090] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0091] The execution subject of the embodiment of the present application may be electronic equipment such as a mobile phone, a computer, a wearable device, and a server. Wherein, the electronic device that encrypts and decrypts the folder or file may be the same electronic device, or it is one electronic device that encrypts the folder or file, and another electronic device decrypts the folder or file.
[0092] See figure 1 , figure 1 It is a schema...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


